CA2228615A1 - Secure credit card - Google Patents

Secure credit card Download PDF

Info

Publication number
CA2228615A1
CA2228615A1 CA002228615A CA2228615A CA2228615A1 CA 2228615 A1 CA2228615 A1 CA 2228615A1 CA 002228615 A CA002228615 A CA 002228615A CA 2228615 A CA2228615 A CA 2228615A CA 2228615 A1 CA2228615 A1 CA 2228615A1
Authority
CA
Canada
Prior art keywords
card
read
write
head
reader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002228615A
Other languages
French (fr)
Inventor
Rene Baus Jr.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Magnetic Products International Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2228615A1 publication Critical patent/CA2228615A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/08Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/08Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes
    • G06K7/082Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors
    • G06K7/083Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors inductive
    • G06K7/084Methods or arrangements for sensing record carriers, e.g. for reading patterns by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes using inductive or magnetic sensors inductive sensing magnetic material by relative movement detecting flux changes without altering its magnetised state
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B5/00Recording by magnetisation or demagnetisation of a record carrier; Reproducing by magnetic means; Record carriers therefor
    • G11B5/008Recording on, or reproducing or erasing from, magnetic tapes, sheets, e.g. cards, or wires
    • G11B5/00804Recording on, or reproducing or erasing from, magnetic tapes, sheets, e.g. cards, or wires magnetic sheets
    • G11B5/00808Recording on, or reproducing or erasing from, magnetic tapes, sheets, e.g. cards, or wires magnetic sheets magnetic cards
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B5/00Recording by magnetisation or demagnetisation of a record carrier; Reproducing by magnetic means; Record carriers therefor
    • G11B5/127Structure or manufacture of heads, e.g. inductive
    • G11B5/33Structure or manufacture of flux-sensitive heads, i.e. for reproduction only; Combination of such heads with means for recording or erasing only
    • G11B5/39Structure or manufacture of flux-sensitive heads, i.e. for reproduction only; Combination of such heads with means for recording or erasing only using magneto-resistive devices or effects
    • G11B5/3903Structure or manufacture of flux-sensitive heads, i.e. for reproduction only; Combination of such heads with means for recording or erasing only using magneto-resistive devices or effects using magnetic thin film layers or their effects, the films being part of integrated structures
    • G11B5/3967Composite structural arrangements of transducers, e.g. inductive write and magnetoresistive read

Landscapes

  • Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Recording Or Reproducing By Magnetic Means (AREA)

Abstract

A novel write/read head for magnetic stripe card readers includes a magnetoresistive read element (135) in a structure which permits the close spacing between read and write heads required of insertion type value card apparatus yet provides magnetic isolation (122) of the read head from the write field generated at the gap of the write head. The use of a second magnetoresistive element (136) in the read head permits the implementation of a security system which precludes the possibility of altering or counterfeiting the cards. Accordingly, high denomination value cards can be issued with a relatively high degree of confidence and magnetic stripe cards, in general, can be issued with that same degree of confidence.

Description

CA 0222861~ 1998-02-04 SECU~E CREDIT C~iRD
FIELD OF THE I~rVENTION

This invention relates to apparatus for writing and reading data on magnetic stripe cards in general and in particular to magnetic stripe cards which require rewriting the card each time the card is used.
~ACKGROUND OF THE I~rVENTION

Value cards or decrement cards are in widespread use worldwide. The cards are purchased by individuals from a card-issuing agency for use in telephones, vending machines, public transportation facilities and toll booths. They are in use, fo-example, in the Washington, D.~. subway system. The initial value of a given card is determined by the purchase price an individual pays for the card.
Access to goods and services, via a value card, is controlled by machines which accept, reaa, and verify the card. Upon completion of a transaction, the machine deducts the price from the value of the card by means of rewriting (and read-verifying) new card data leaving the process of card removal by the card owner The owner can cont:inue the use of the card until the value is exhausted.
Unfortunately, present value cards lack security because the cards are easily counterfeited or altered. Consequently, the use of magnetic stripe cards in the value card field has been limited to low denominations (i.e. under $100.00) where financial exposure is limited. In order for such cards to be used for higher CA 0222861~ 1998-02-04 W O 97/06504 PCT~US96/1246~denomination transactions higher degree or s~cu-~t~ is required BRIEF DESCRIPTION OF THE INVENTION
In accordance with the principles of this nvention, a security system is provided which takes advan.ag~ of the read/wri,e accuracy of a novel self-clocking read/write head to implement a security system which prevents counterfeiting a-~ card alteration.
The system is operative to generate a new secur-~y nu~lber each .ime the card is used. Further the system employs an aigorithm which is operative to induce jitters purposefully to ge-erate and subse~uently read unique securi.y numbers.
The novel read/write head comprises a write head with one or two magnetoresistive read heads. The write heaà contains a gap and a coil. When current flow is imposed on the co l, the write head generates a fringing magnetic field that magnetizes the magnetic stripe, of a coupled magnetic stripe card, in a given direction depending on the direction of current flow. Thus, as a card moves past the head gap, a programmed sequence of current reversals generates flux reversals on the stripe which rep~esent the encoded data, a set of binary ones and zeros, as is we~l understood.
In the write process, the magnetoresiStive ~ead head furnishes sensing signals which precisely locate the flux reversals written on the coupled magnetic stripe, independent of card velocity or acceleratiOn~ In one embodiment, a read/write head herein comprises a rectangular plate o~ high permeabi'ity magnetic material to one side of which lies the magneto-2sistive read head.

CA 0222861~ 1998-02-04 W O 97/06504 PCT~US96/12465 ~he write head is loczt~a o~ the other side o th~ pl_--. The high relative permeability (i.e over 100,000) of the pla=e mate-ial serves to isolate the read element from the s.rona ma~netic lield generated a. the write gap. A read/write head s~ruc~ure which locates the write and read heads in very close proxim ty and still avoids the irherent high c~ss-feed between such :nea_s, as is common with conventional read and write heads, -s c~nsidered G
significant departure from prior art thinkin5. The structure permits a low cost, reliable means for writing ar,d reading data on a magnetic stripe which -s o~ sufficient low cos. t_ ~e used with a value card With value cards, the struc~ure perm-.s the realization of an ideal hand drawn device that is ~ree o the high cost of motor drives and encoders which woulc read on card insertion and would rewrite the card and verify its correctness when the card is being removed.
In another embodiment, two magnetoresistive films are employed for the read operation. The uni~ue read/write head permits the implementation of a simple security system which prevents alteration o~ counter~eiting o~ a magnetic stripe ca-d. United States Patent No. 4,628,195, issued December 1986 to Rene Baus, discloses a method for improving the security of magnetic stripe cards by employing the inherent jitter pattern o encoded data on the magnetic stripe to identify a particular magneti_ stripe card.
In accordance with another aspect of this invention, the unique read/write structure of the head permits a system to be realized which totally prevents counterfeiting and card alteration by CA 022286l~ l998-02-04 WO 97/06504 PCT~US96/1246SpurDosely inducing a uniaue j-t.er pat~ern .o generate and subsequently read a unique security number each time the card is used. The security system em~loys an algorithm which controls the jitter pattern as well as a central store which stores the number each time a transaction occurs.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a schematic representation ol an inse~t card reader in common use with a value card with a magnetic stripe;
Fig's. 2, 3, and 4 are enlarged views o~ a read/write head in accordance with the principles o this invention illustrating the layout of the magnetoresis~ive elements, the cross section o~ the head and the layout of the write head respectively;
Fig~s. 5 and 6 are top and cross section views of the read/write head o~ Fig's. 2, 3, and 4 showing a cover in place over the write head;
~ ig. 7 is an exploded view of the read/write head of Fig's. 2, 3, and 4;
Fig's. 8 and 9 are schematic representations of a portion o, the read/write head of Fig~s. 2, 3, and 4 and waveforms o~ the read head output, the digital form of that output and the write current the state change times of which are determined by the transactions in that output.
Fig. 10 is a block diagram of the electronic circuit for the operation o~ the read/write head o~ Fig's. 2, 3, and 4 employing a single magnetoresistive read head;
Fig 11 is an exploded view of another embodiment o~ this CA 0222861~ 1998-02-04 invention employing two magnetoresistive elements for the read head;
Fig's. 12 and 13 are schematic illustrations of a portion of the read/write head embodiment of Fig. ll and various waveforms which depict the timing of write clock for the write head therein and the two digital waveforms from the two magnetoresistive elements which determine that timing;
Fig. 14 is a block diagram of the electronics for the embodiment of Fig. ll employing a read head with two magnetoresistive elements:
Fig's. 15, 16, and 17 are write, read and decode logic diagrams for the embodiment of Fig. ll;
Fig's. l~, l9 and 20 are write, read and decode logic diagrams for the embodiment of Fig. ll depicting the means for generating the embedded security numbers that are used to prevent card counterfeiting and card alteration; and Fig's. 21, 22, and 23 are block diagrams of the methods for generating and verifying a security code in accordance with the principles of this invention.
DF~T~TT~F~n DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS OF THIS INVENTION
Fig. l shows an insert reader l0 secured to a frame represented at ll and positioned for a card 12 to be inserted from the left, as viewed. A self-clocking head 14, in accordance with the principles of this invention, is positioned for coupling to the magnetic stripe (not shown) as it is inserted and withdrawn from the reader. The card is read on insertion and written and read-SUBSTITUTE SHEET (RULE 26~

~ CA 022286l~ l998-02-04 ~?r~ 7 verified on withdrawal. The self-clocking electronics is represented by block 15.
Fig~s. 2, 3, and 4 depict enlarged views of a read/write head in accordance with the principles of this invention. The main structural element of the head is a rectangular plate 22 which, in practice, is about .110 inch wide by .300 inch high by .002 inch thick. The plate is composed of high permeability magnetic material such as mu-metal or supermalloy. The magnetoresistive read head 23 lies on one side of plate 22 and the write head lies to the other side of the plate as represented in the figures. The relatively high relative permeability (i.e. > 100,000) of the plate material coupled with the low reluctance geometry of the plate structure serve to isolate the read element(s) from the strong magnetic field generated at the gap of the write head. The physical dimensions and materials described herein are chosen to be suitable for reading and writing on magnetic stripe cards that are in accordance with ANSI and ISO standards. Other standards and applications employing the principles of this invention may require different head dimensions and spacing between the read and write elements.
The various layers that constitute the write head and read head structures can be batched fabricated using well known techniques of vacuum sputtering, electroplating chemical deposition, ion etching and photoresist lithography. These are the same techniques developed for producing large scale integrated circuit chips and high density magnetoresistive digital heads for disks and tapes.

6 .

The write head (24) o~ Flg's. 3 and 4 consis-s ~- a ~ap 30, a write coil 31, and a high permeability cover 32, shown also in Fig's. 5 and 6, whicn completes the write gap ~ path. The gap is filled by a copper layer deposited on the t-~ end o~ plate 22. The gap is formed by the top portions of plat- 22 and cover 32. A silicon dioxide layer 35 of Fis. 3 insuia~es coil 31 (and its two leads) from plate 22. The read head of ~ g. ~ csntains a first and second magnetoresistive elements 40 ar.d -_ wi.h cop?er connector 43, 44, and 45. A thin silicon oxide la~e- ~6 (see Fig.
3) insulates the magnetoresistive elements, and -o-.-.-cto~s 43, ~4, and 45, rrsm plate 22. Only one magnetoresisti~e _lement (i.e element 40) is affected by the magnetic field o ~he card stripe.
Element 41 is isolated from the stripe field by -.s relatively large distance from the card and its close proximity to plate 22 which short circuits the stripe flux before the flux reaches element l The purpose of element 41 is to minimize common mode external noise that a~fects both elements 40 and ~; equally. As will be shown hereinafter (in connection with Fig. 10), magnetoresis.ive (MR) elements o and 41 form elemen~s OL a bridge circuit tha~ cancels common mode noise.
In Fig 3, the cover 32 is shown as a separa~e entity which is attached to the plate 22 after the various layers (contzining the MR elements and the copper conductors) have been completed The cover 32 is made up o~ multiple layers of mu-metal or some other so~t magne~ic material bonded together to form the cross section shape shown. Well known techniques from magnetic head manu~acturing are used to batch process the cover along with the plate such that CA 0222861~ 1998-02-04 W097/06504 PCT~US96/12465 the individual heads are not separated from each other until the batch fabrication is complete. Figls 5 and 6 show a cover that is deposited on the substrate by use of vacuum sputtering. In practice, the fabrication choice for the cover will depend on the application: i.e., primarily on the wear requirement and the coercivity of the magnetic stripe; the bonded cover offers more choices in the selection of materials.
Fig. 7, an exploded view of the head of Fig. 3, shows the relative positions of the various elements of the self-clocking head. On the left side of the substrate 22, are located the two MR
read elements 40 and 41, their three copper leads 43, 44, and 45 and the silicon dioxide insulating layer 46. On the right side are located the copper gap spacer 30, the silicon dioxide layer 35, the write coil 31, the write coil leads, and the cover plate 32. It will be noted that the distance between the trailing edge of the write gap and the plane of the MR head (40 and 41) is given ideally as one-half the bit length to be recorded on the card. As will be seen below, this condition is invoked for the purpose of explanation; it is not necessary to hold this dimension to the ideal tolerance of plus or minus 1 percent.
Fig's. 8 and 9, which illustrate the self-clocking write principle of the first embodiment, show a schematic drawing of the write and read elements (for clarity not drawn to scale) and the waveforms of the output of magnetoresistive element (MR) 40, the digitized output, and the write current, respectively. The digitized output controls the timing of the write current direction changes. As shown, a card with magnetic stripe 80 moves from right SU~SllTUTE SHEET (RULE 26~

CA 0222861~ 1998-02-04 W097/06~04 PCTAJS96/12465 to le~t as viewed in Fig. 8. ~or clari~-, ~he wave-orms are drawn ~or a constant card velocity.
On a virgin card (one that does not contain any encoded data!, ~ a single flux reversal is written on t:-e card by means of sensins the leading card edge with a photo detector (not shown) as is common in magnetic stripe card readers Desisnate this time instant tl as shown on the write current waveform. ~fter a tim~
interval that depends on the card velocity, this flux reversal produces a pulse in the output of the MR element ao, at time t~, at which instant,the write current changes direction causins a second ~lux reversal to be written on the card In turn, the secona flu;:
reversal writes a third reversal, and so on until the card stripe has completely passed by the head. Thus, the card track is covered by equally spaced ~lux, reversals along its length. The spacing length is precisely equal to the distance between the trailing edge plane of the write gap and the plane of the MR 40 element, which has been chosen to be one-half the bit segment length of the encoded data. What has been demonstrated so ~ar is that the arranyement ol Fig's. 5 and 6 are capable o, writing preciselv spaced flux reversals on the magnetic stripe card, independent o~
velocity and acceleration.
On a card that contains previously encoded data that must be re-written, the initial ~lux transition on that card serves to institute the write process described in the preceding paragraph.
Once the write process begins, the ~ead erases t~le p~-evlously encoded data.

CA 0222861~ 1998-02-04 W O 97/06504 PCTrUS96/12465 lhe so-called Aiken or biphase code speci-ied by the referenced ISO an~ ANSI standards represents ~ "one" bv a bit segment with a fl~x reversal in its middle ar,d a "zero" by a bit segment without a middle flu~ reversal; thus ~:~e flux reversals described by the p~eceding paragraph represent a sequence of ones.
To write ~zeros~ using the scheme of Fig's. 8 a~.d 9 requires a ti~e prediction which s obtained in the followin way.
It is noted -n Fig. 9 that a "zero~ is ~r-tten by the writ~
current between t5 and t7. Whereas t5 is acc-rately defined bv the flux reversal that actuates the MR read h~ad, ~o such time determination is available for the t7 re~uired change in the write current. The write electronic logic, to be described determines the t7 value where the current change is needed to suppress a current change at t6. It does this by measuring the ti~e interval (t6-t5) and calculating [t7 = t6 + (t6-tS)]. Such a prediction calculation can be performed by a microprocessor or it can be performed by say a PAL chip programmed as counter using a count frequency that is greater than say 100 times the bit rate recorded on a card at the maximum usable card velocity. At a card veloci~y of 50 inches/second, a count frequency of 2 Mhz would provide t7 accurate to one percent of the nominal segment length 'or the standard 210 bit/inch recording density.
jitter is defined by the referenced ANSI and ISO standards:
jitter is the percent deviation of a bit segmen. from its nominal value, ~n the case of lO or 75 (bits per incl~ -a~s O;ll,~ayn~
stripe cards, the maximum allowed jitter is 10 percent. For 210 CA 0222861~ 1998-02-04 bpi on a card moving at a velocity of 50 inches/sec, - t can be shown that a card acceleration of 1, 000, 000 inChes/seCond-saUared produces card jitter Oc l percent. At 10 inches pe- seconà, l percent induced jitter requires an acceleration of -2,000 inches per second-squared. Surpris-ngly, accelera ions ap?-vaching th~ese values have been observed in some hand drawn and mo_c-ized card encoders on the market. However, careful attenlior. .o design details will reduce card acceleration to a fraction o- the values cited here. One concludes that the first embodimen. of this invention is able to encode cards having jitter wel' within the allowed values of the referenced standards.
In Fig. 8, the specified distance between the ~a? trailing edge and MR plane is speci_ied to be 0.50000 bit lensth plus or minus 1 percent (which for 210 bpi is + or - 23 micro-inches).
Although such a close spacing tolerance is not uncommon in microelectronics fabrication, it need not be held here to closer than say 0.G020 inch plus or minus 10 percent (+ or - 200 micro-inch). One percent tolerance on jitter can still be achieved by means of a time count adjustment (e.g., software switches) in the electronic ci-cuit; this adjustment is made during final assembly to compensate for variations allowed by the larger s?acing tolerance.
~ ig. 10 is a block diagram o~ the electronics, used with the first embodiment of the self-clocking head. MR read head 40 is the active elemen~ that senses ~he card flux transition; it and ~IR 41 (the passive element) form one side of a bridge circuit which is CA 0222861~ 1998-02-04 W O 97/06~04 PCTnJS96/12465 completed by an adjustable trim potentiometer 100. As ment_onea before, the use of the active and inactive elements rejects common mode noise (~rom power supplies, nearby equipment, the ef,~ect oE
the earth~s magnetic field, etc); the advantages of a bridge circuit for detectins low amplitude signals are well known and need no further elaboration herein.
The output of the bridge is amplified by am~lifier 'C', pea~
detected by peak detector 102, and ~ed into a timer ci~cu t 103 that controls the write circuits. The write circuits are represented by block 10~. The microprocessor controller '06 performs housekeeping chores, communicates with the host computer 107, supplies new write data to the write data register 108, and decodes the read data. The block diagram of Fig. 10 is adap.able to most applications. Parenthetically, it is mentioned that electronic circuits and microprocessor algorithms for velocity independent decoding of magnetic strip cards using a single head gap are commonplace in the industry and need not be described here.
Consider the value card insert reader/encoder shown schematically by Fig. l: the card is read on insertion; re-written and read-verified when it is removed. On the way in, the data on the card is read by the MR read head; the read head signal is electronically decoded and sert to the host, which is defined to be an embedded computer in a telephone or vending machine (Gr some other device) that controls the transaction. If the data is dete~mined to be valid, the host authorizes the transaction, gives the appropriate commands to effect the transaction, and transmits CA 0222861~ 1998-02-04 W097/06~04 PCT~US96/1246 new data to be written on the card As the card is withdrawn, new data is written and read verified.
What happens, if for some reason, the read verification detects an error on the card when the card is being removed?
Typically, value card readers contain a display which instructs the user to reinsert the card for a second or third attempt at proper encoding. If all such attempts fail, the terminal presents to the user a printed receipt showing the remaining balance on his defective, now unusable, card. This receipt along with the defective card can be redeemed by the user. Even though this remedy exists, it is inconvenient for the customer and costly to the card issuer. For such a card system to succeed, the read/write error rate must be less than a small fraction of one percent.
The first embodiment of the self-clocking head of the present invention will significantly improve the read/write reliability as compared to existing devices. The self clocking head uses MR
sensing elements that respond to the card flux rather than to the rate of change of flux response found in conventional magnetic heads. Thus, the MR head is approximately lO times less sensitive to the high field from the write head, assuming that the write current rise time is approximately l/lO the time between flux reversals. In addition, MR heads can be built to have a magnetostrictive coefficient of zero; conventional heads are highly microphonic. Finally it is noted that the use of two MR elements in the bridge circuit reduces external magnetic field noise. In ~ short, the MR head has a significantly higher signal to noise ratio SUBSTlTUrE SHEET (RULE 26) I CA 022286l~ l998-02-04 F~ 7 compared to conventional heads.
Fig. 11 is an exploded view of a second embodiment of this invention which is similar to the first except that a second MR
pair identical to the previously described (MR 40 and 41) pair has been added in the (read) plane which is separated from the write plane by precisely 1/2 bit length. As before, the read plane is separated from the traillng edge of the write gap by 1/2 bit length.
The figure shows a plate 122 which corresponds to plate 22 of Fig. 7. The plate separates the write plane, to the right of the plate, as viewed in Fig. 11, from the magnetostrictive (MR) read plane to the left of the plate. The write plane comprises silicon oxide layer 123, write coil 124 with leads 125, cover, 126 and unit gap 128. The read plane comprises two MR heads each with an associated MR head to reduce common mode noise as was the case with the embodiment of Fig. 7. The MR elements are designated 135 and 136 in Fig. 11 with associated read coil leads 137 and 138 respectively. The read head also includes silicon oxide (electrically insulating) layers positioned between the MR element (planes) and between element 135 and plate 122 as shown.
The purpose of the second embodiment is to provide anti-counterfeiting and to prevent card alteration. Jitter patterns can be written and read with great accuracy. It follows that security codes can be generated and embedded in the normal digital information contained on a card. Value cards or decrement cards will contain one or more security codes when issued. Each time the 14 ~ S~

W O 97/06504 PCTAUS96/12465card is used to purchase gooas or services, the secur ~ code will be used to validate the card; at the completion of a .ransaction, a new security code will be written on the card.
Fig~s. 12 and 13 show the write gap, the two MR héacs, labeled 135 and 136, the analog and digital waveforms from 135 ar.d 136, and the write clock respectively. The time prediction ~ased in the first embodiment for writing zero bits on the card is no longer required: by combining the digital waveforms 'rom 13_ and 136, a write clock is generated that contains all the s.ate changes necessary to precisely locate the write current trans-t-ons in the time domain for any sequence of binary ones and zeros. This means that the embodiment of Fig. 11 is capable o~ writing low jitter data at any card velocity or acceleration--even if the card stops momentarily, proper data will be written. This feature significantly improves the write and read reliability.
As described before, the initial transition show~ in Fig. 11 can be provided by either a photodetector that senses the leading card edge or by pre-existing flux change on the card. The other pre-existing flux changes on the card are written over and thereby erased when the card is updated.
Fig. 14 is a block diagram for the electronics for the embodiment of Fig. 11 which includes the two MR read heads 135 and 136. As shown in Fig. 11, each of those heads has an associated MR
element (not designated) employed for common mode noise cancellation. The elements ~re connected inte ~ L~ ~a ~.S ~'S.C j-, each with a trimming potentiometers 150 and 151. The outputs from CA 0222861~ 1998-02-04 the bridge are connec~ed to am?lifiers 152 and 153 r~s~ec_ively.
In turn, the outputs o~ the amplifiers are connected tc t:~e input o~ peak detectors 154 and 155. The outputs of both peak detectors are connected to the input of a timer 156. The outpu~s c_ timer 156 are connected to a read decoder 157 (via line 158) and to an input to a microprocessor cont~oller 159 (via line 150).
The outputs of read decoder 157 also are connected tc inputs to microprocessor 153 via data line 161 and strobe line 16~. Timer 156 output (line 160) also is c2nnected to an input to wri.e data register 165. A write data output f-om mic~oprocesso- 15g is connected ~o a second input to register 165. The output of register 165 is connected to an input to write circuits 166 the output of which drives the write head 167 Another output of microprocessor 159 is connected to an input to register 165 and write circuit 166 via write-enable line 170.
Consider now the operation of writing and reading a card with the embodiment o~ Fig's. 11, 12, 13 and 14 The signals ~rom the two MR heads are used to generate the write clock and they are used to recover the data from the card. Both functions must be carried out simultaneously. Additionally, as will be seen, security numbers must be generated and compared to each other, all of which would place a signi~icant burden on the microprocessor.
Alternatively, as in Fig. 14, writing and reading decoaing are performed by simple logic circuits, leavinq .he mic-oprocecsor 'ree for other tasks such as communicating with the host, generating and CA 022286l~ l998-02-04 WO97/06~04 PCT~US96/12465 comparing security numbers, loading data into the write data register, and controlling the write enable function 170.
In Fig. 14, the signals ~rom the active MR elements are individually amplified, peak detected, and then fed into a timer 156 which combines these signals to generate the write clock. The write clock, in turn, clocks the previously stored data out of the write data register 165. These data are written on the card by the write circuits 166 and the write head 167 such that the flux transitions on the card occur in close synchronization with the write clock.
The two peak detected signals (from 154 and 155) are also passed on to the read decoder 157 which decodes the signals and generates a data stream on strobe lines 161 and 162, respectively.
These data are fed into the microprocessor which analyzes the read data content and the embedded security codes to verify the accuracy of both.
Fig.'s 15, 16 and 17 are writes, read, and decode logic diagrams, respectively, that describe the method of generating the write clock and the method of decoding the read signals from the two MR read heads 135 and 136 of Fig. 11. Amplified head signals (from 152 and 153 of Fig. 14) are turned into digital waveforms 200 and 201 (by the peak detectors 154 and 155 of Fig. 14). The write clock of Fig. 15, is generated by state changes occurring in either of the outputs of the peak detectors.
To decode the read data, first perform an 'lexclusive or"
function on waveforms 200 and 201 which yields waveform 203 of Fig.

SUBSTlTUtE S~ RULE 26~

.

CA 022286l~ l998-02-04 WO 97/06504 PCT~US96/12465 17; second, invert the write clock to obtain waveform 205; third, perform an "and" function on waveforms 203 and 205 to obtain the data stream 206 which is high for ones and low for zeros. The data strobe 207 is obtained by shifting the write clock by a time value of 1/2 the write clock interval.
Thus is has been demonstrated that the second embodiment of this invention is capable of reliable reading and writing on a ANSI
& ISO magnetic stripe cards totally independent of card acceleration. Because the second embodiment is more reliable (and foolproof) than the first, it should be employed in systems that operate on high denomination value and decrement cards where errors cannot be tolerated. But its chief value is that it enables a security system to be implemented, a system that will prevent counterfeiting and alteration of the card. This feature will now be described.
Fig.'s 18, 19 and 20 are write, read, and decode read waveform logic diagrams that show a method of generating a security number on a card by intentionally introducing a bit edge shift at two random positions on the card to mark the beginning and end of a sequence of ones and zeros, a subset of the total information in the data field, that will constitute the security number. The diagrams of Fig.'s 18, 19 and 20 relate to the embodiment of Fig.
14. Assume for this example that the beginning mark is a bit shift of say 5 percent (of the bit segment length) to the left as shown in the waveform at the bottom of Fig. 18. The end mark is a shift of 5 percent to the right. In between lies the binary number SUBSTITUTE SHEET ~RULE 26) CA 022286l~ l998-02-04 W097/06504 PCTrUS96/12465 100101 which constitutes the initial security number (ISN).
Suppose that this same binary number exists elsewhere in the data field to be written on the card and that we also mark it in the same way and call it the final security number (FSN). To establish that the card is valid during the subsequent read process, the ISN
& FSN numbers are extracted from the data and compared: if they do not match or if either are missing, the card is declared invalid.
The host computer (see Fig. 14)includes a memory which stores ISN
and FSN numbers with associated user I.D.'s and a comparator to check instant numbers with stored numbers.
The security number can be of any length, it can begin at any position on the card, and its digits need not be derived from contiguous digits in the data field. Given this flexibility, it is virtually certain that two suitable matching numbers can be found in the data field which typically contains over 600 bits in a normal 210 B~I encoded stripe. In the microprocessor 159 of Fig.
14 would reside an algorithm for analyzing the data field, selecting the security numbers, and implementing the write function bit shifts to mark their place.
Because of the precise clocking scheme inherent in the second embodiment of this invention, there exist an infinity of different, reliable ways to generate and compare security numbers--the method described above is but one. Doubtless, each individual commercial application of the self clocking head would, for maximum security, employ its own unique method of generating such security numbers.
One of the techniques available to counterfeiters of credit S~I~S ~ 1 1 ~E SH~El' (RULE 26 CA 0222861~ 1998-02-04 cards is called skimming, which involves the use of a simple read-write device to copy data from a valid card to a blank card. The device contains a card slot with a write head on one side of the slot and a read head on the other side. Both cards a_e held firmly together and passed through the slot. The data from the valid card is read and transferred to the blank card presumably preserving all the characteristics of the original, including the jitter pattern.
In the case of value cards or decrement cards skimming is a serious problem. The counterfeiter buys a ~alid card and makes as many copies as he desires. Each of these copies can be used with the same racility as the original. And the coun~erfeiter does so with impunity: unless there is a central data base that stores all of the transactions on each issued card, the card issuing agency does not even know that it is being swindled.
What, if anything, prevents skimming in the case of the security system described in accordance with this invention? The answers to this ~uestion follows: 1. In general, it is not true that skimming preserves the exact jitter pattern of the orisinal:
experimental evidence shows that the skimming process in~roduces its own jitter which typically exceeds 5 percent because of imper~ections in the card stripe, acceleration in the card motion versus the response times of the read and write circuits, write to read crossfeed and other noise, poor head contact, and the physical characteristics of the read and write heads used in the skimming device which doubtless diEfer Eroln tho5e U~ ed by C~le CaL'd issUeL' to encode the card in the first place. -~t is unlikely .ha~ a counterfeiter would have the fabricatio~ a~ili.y and the kr.owledGe to copy cards having the necessary precision in the jitter pa.tern to de~eat the security system of this invention. 2. The counter~eiter~s di~iculty is compounded by the use of the MR thin ~ilm read heads and the finite pole (ie., less than the recorded half-wavelength) on one side (the following edge) OL the wri,e gap o~ this invention which intentionally introduces asymmetricG' distortion in the Llux pattern written on the card Attemp~s _o copy a card with this inherent distor~ion would _ail to reproduce the original jitter pattern.
Figures 19 and 20 sh.ow the read verification o~ the securi_y code written as discussed hereinbe~ore. Figure 19 shows the digital (read) outputs from heads 135 and 136. Figure 20 shows t:.e exclusive OR waveform 220 from heads 135 and 136, the write ciock state changes 221, the data (220 'AND' 221) 222, and the strobe 223.
Figures 21 and 22 are block diagrams o~ the method for generating and veri~ying a security code, respectively, in accordance with one aspect of this invention. As shown in figure 21, the host computer, represented by block 230, stores a card data field for each card issued as indicated in block 231. The data ~ield contains 630 bits o- 105 bvtes c~ ~ alp~a-~ ner-c characters. There exists as least one character wllich appeaLs twice in the data field. The host searches the data field f or a -CA 022286l~ l998-02-04 W097/06504 PCTrUS96/12465 card in use and choose two identical characters that appear in t~e data field as indicated in block 232. The characters are called M
and N and are integers which represent the characters sequential order in the data field.
A card in use enters a write clock, as shown in figure 18 and a write clock delayed by a time shift equal to .05 times the bit length divided by the card velocity as shown in blocks 233 and 234 of figure 21. As shown in block 236, the host writes data on the card and flags the M and Nth bytes by 5% delays in each of their initial flux reversals as shown in figure 18.
The code verification method is represented by the block diagram of figure 22. The card in use is read as indicated by block 240 in figure 22. The data, so read, is decoded as discussed in connection figures 15-20. The decode operation is represented by block 241. The decode data is searched for 5~ ~itter transition markers as shown in figure 20 (at 220). If present, store the Mth and Nth byte. This search and store operation is represented by block 243. The host determines if M equals N and if both exist as indicated by block 243. If "NO", an error is indicated (line 244).
Also, the host does a parity check, read data is sent to the host computer as indicated by block 249.
A block diagram for the operation of a decrement (or value) card reader/writer is shown in figure 23. The diagram represents the operations of both the decrement card reader and the vending machine host by blocks 250 and 251 respectively.
Operation commences by the insertion of a card as indicated by SUBSTITUTE SHEET (IRULE 26) CA 022286l~ l998-02-04 block 253. The card is read and the data on the card is decoded and stored as indicated by blocks 254 and 255. The parity of the decoded data is checked and, if incorrect, a "RE-READ" indicator is turned on as indicated by blocks 257 and 258.
If parity is correct, the security number is checked as indicated by block 259. If the security number is not correct, the "RE-READ" indicator is turned on as indicated by block 260. If both parity and the security number are correct, the card data is sent to the host as indicated by block 262 and the host checks for sufficient funds on the card as indicated by block 263. If "NO", the lack of sufficient funds is indicated as represented by block 264. If there are sufficient funds, service is provided as indicated by block 265 and the cost of the service is deducted and the card data recalculated as indicated by block 266.
The new card data is sent to the reader/writer as indicated by block 269. The stored data is analyzed to find two 6-bit security numbers and to determine the bit count that locates each number in the data field. This analysis is indicated by block 270.
Also, the data read is compared to the write data as indicated by block 271 to determine if the data is true as indicated by 272. If "YES", a standby mode is indicated. If "NO", a card error is indicated with notice to reinsert as indicated by block 273. If unsuccessful after two or three attempts to re-write a card, a refund voucher is printed as indicated by blocks 274 and 275.
Simultaneously, card data analyzed at block 270 is followed by an indication to remove the card (block 277) if an error is SUBSTITUTE SHEET (RULE 26) indicated, by writing the card and read-verifying the card data (block 278) and comparing the read data to the write data (block 271).
Although the invention has been described in terms of a value card, the unique read/write head and the security system engendered by it's usage are equally applicable to hand swipe magnetic stripe card usage in general.

SVBST3TLITE SHE' ~ ~ULE 26~

Claims (7)

What is claimed is:
1. A magnetic card, hand operated reader, said reader including a self clocking unit and read head combination comprising a high permeability magnetic plate having first and second sides and an edge with a thickness of about one half bit length, a magnetic write head connected to said first side at said edge and at least a first magnetoresistive element read head on said second side at said edge, said write head and said magnetoresistive element being thus disposed at said edge about one half bit length apart separated by said high permeability plate.
2. A reader as in claim 1 also including circuitry for compensating for the difference between the actual spacing between said write and read heads and the desired one half bit spacing therebetween.
3. A reader as in claim 1 including a second magnetoresistive element read head on said second side at said edge, said first and second magnetoresistive elements being disposed at said edge about one half bit length apart from said write head by said high permeability plate.
4. A reader as in claim 3 also including first and second common mode magnetoresistive elements electrically in series with said first and second magnetoresistive elements read heads respectively, each of said write head and said first and second read heads being spaced apart by about one half bit spacing.
5. A reader as in claim 3 including first and second common mode magnetoresistive elements electrically in series with said first and second read heads respectively.
6. A reader as in claim 3 also including control circuitry for controlling said write head to encode a coupled magnetic stripe in a manner to introduce an encoded jitter pattern into the encoded data written into said stripe.
7. A reader as in claim 4 in combination with a central store for storing coded jitter patterns in association with user identification's and for comparing codes generated by a user card during a transaction with codes stored for the card user at said central store and for controlling said control circuit.
CA002228615A 1995-08-07 1996-07-30 Secure credit card Abandoned CA2228615A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/511,921 1995-08-07
US08/511,921 US5650606A (en) 1995-08-07 1995-08-07 Accurate read/write head for preventing credit card alteration and counterfeiting of debit cards

Publications (1)

Publication Number Publication Date
CA2228615A1 true CA2228615A1 (en) 1997-02-20

Family

ID=24036988

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002228615A Abandoned CA2228615A1 (en) 1995-08-07 1996-07-30 Secure credit card

Country Status (7)

Country Link
US (1) US5650606A (en)
EP (1) EP0843861A4 (en)
JP (1) JPH11510299A (en)
KR (1) KR19990036269A (en)
AU (1) AU6642196A (en)
CA (1) CA2228615A1 (en)
WO (1) WO1997006504A1 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5780828A (en) * 1996-02-15 1998-07-14 Dh Technology, Inc. Interactive video systems
US5770846A (en) * 1996-02-15 1998-06-23 Mos; Robert Method and apparatus for securing and authenticating encoded data and documents containing such data
US6601140B1 (en) * 1999-04-07 2003-07-29 Sony Corporation Memory unit, data processing unit, and data processing method using memory unit type
US6513713B1 (en) * 1999-06-09 2003-02-04 Sankyo Seiki Mfg. Co., Ltd. Magnetism detecting apparatus and magnetic material identifying apparatus using the same
US7591426B2 (en) * 2003-04-21 2009-09-22 Josef Osterweil Method and system for data writing/reading onto/from and emulating a magnetic stripe
US7017811B2 (en) * 2004-05-18 2006-03-28 Computerized Security Systems Electronic card encoder
US8090654B2 (en) * 2006-03-17 2012-01-03 Mastercard International Incorporated Techniques for transaction adjustment
US9098851B2 (en) 2008-02-14 2015-08-04 Mastercard International Incorporated Method and apparatus for simplifying the handling of complex payment transactions
US8341084B2 (en) 2009-06-08 2012-12-25 Mastercard International Incorporated Method, apparatus, and computer program product for topping up prepaid payment cards for offline use
US9619741B1 (en) * 2011-11-21 2017-04-11 Dynamics Inc. Systems and methods for synchronization mechanisms for magnetic cards and devices
US8534555B1 (en) * 2012-05-15 2013-09-17 Cypress Semiconductor Corporation Reconfiguration of a card reader for wake-on-swipe
US9104922B2 (en) * 2012-06-15 2015-08-11 Honeywell International Inc. Anisotropic magneto-resistance (AMR) gradiometer/magnetometer to read a magnetic track
US9600755B2 (en) 2013-04-12 2017-03-21 Cardlab Aps Card, an assembly, a method of assembling the card and a method of outputting information
CA2863937C (en) * 2014-09-17 2018-01-09 Dashpass Inc. An enabling card and method and system using the enabling card in a pos
JP2016189055A (en) 2015-03-30 2016-11-04 日本電産サンキョー株式会社 Card reader

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3662343A (en) * 1970-07-29 1972-05-09 Docutel Corp Credit card automatic currency dispenser
US3949193A (en) * 1974-01-07 1976-04-06 Electrospace Corporation Credit card reader having two magnetic readout heads
US3908194A (en) * 1974-08-19 1975-09-23 Ibm Integrated magnetoresistive read, inductive write, batch fabricated magnetic head
FR2402252A1 (en) * 1977-08-30 1979-03-30 Cii Honeywell Bull PRINTED CHARACTER READING DEVICE
US5206489A (en) * 1989-02-17 1993-04-27 Datacard Corporation Magnetic encoding device for cards
US5010240A (en) * 1989-04-11 1991-04-23 Mag-Tek, Inc. Composite ticket processing unit
US5235166A (en) * 1991-02-14 1993-08-10 Xtec Incorporated Data verification method and magnetic media therefor
JP2581421Y2 (en) * 1991-06-17 1998-09-21 株式会社村田製作所 Magnetic sensor
US5254843A (en) * 1991-08-07 1993-10-19 Hynes John E Securing magnetically encoded data using timing variations in encoded data
US5266786A (en) * 1991-10-01 1993-11-30 Ncr Corporation Magnetoresistive head for reading magnetic ink characters
JPH06223319A (en) * 1993-01-25 1994-08-12 Matsushita Electric Ind Co Ltd Thin film composite magnetic head and manufacture thereof
US5625689A (en) * 1993-04-09 1997-04-29 Washington University Method and apparatus for secure data storage and manipulation using magnetic media
US5434733A (en) * 1994-02-18 1995-07-18 Hewlett-Packard Company Planar head having separate read and write gaps

Also Published As

Publication number Publication date
US5650606A (en) 1997-07-22
JPH11510299A (en) 1999-09-07
WO1997006504A1 (en) 1997-02-20
EP0843861A1 (en) 1998-05-27
AU6642196A (en) 1997-03-05
EP0843861A4 (en) 2000-07-19
KR19990036269A (en) 1999-05-25

Similar Documents

Publication Publication Date Title
US5650606A (en) Accurate read/write head for preventing credit card alteration and counterfeiting of debit cards
US5235166A (en) Data verification method and magnetic media therefor
US4507550A (en) High security credit card, system and method
US7725726B2 (en) Method and apparatus for securing and authenticating encoded data and documents containing such data
EP2089834B1 (en) Card with variable magnetic stripe
US6830183B2 (en) Device for secure read, write and read/modify/write operation with divided track transducer head
US4228348A (en) Security document and system
US3869700A (en) Stored value system
JPH0678037B2 (en) Authentication device for authentication identification medium
EP0938720B1 (en) A record carrier and method of labelling an article of value
JPH0438045B2 (en)
JPH06103423A (en) Method for preventing illicit usage of magnetic card and the like and magnetic card
EP0024800A1 (en) Security document and system
EP0128535B1 (en) Value-rated magnetic card writing and reading system, particularly for public telephony
US7543151B2 (en) Method and apparatus for securing and authenticating encoded data and documents containing such data
JP3390484B2 (en) Record carrier card authenticity judgment device
JP3858338B2 (en) Magnetic barcode and magnetic barcode reading system
EP1256094B1 (en) Ticket provided with a magnetic layer, and a corresponding apparatus for ticket emission, validation and inspection
WO1992018977A1 (en) Magnetic data medium and its production, data system and data decoding device
JPH06103424A (en) Method for preventing illicit usage of magnetic card and the like
GB2257092A (en) Magnetic token and token transaction system
JPH06111043A (en) Card and method for adjusting sensor position
JPH09231301A (en) Magnetic marker and its reading method
JPH10233004A (en) Method for reading marker having meangetic anisotropy and device therefor
JPH05324946A (en) Magnetic card and identifying system for the same

Legal Events

Date Code Title Description
FZDE Discontinued